MANAGEMENT OF STEGANOGRAPHY OLALEKAN A. ALABI COSC 454.

Slides:



Advertisements
Similar presentations
CALEB WALTER 7/14/2013 Audio Stego – A Brief How To.
Advertisements

Steganograp hy By : Uday Deep Singh (IT-2 / 7 th Sem) “The Art Of Hiding Content In Images” 1.
Khan, Mohammed Minhajuddin
Steganography The Art of Hiding Messages
“The Art of Hiding Data”
-Archana Sapkota -Deepti Reddy Steganography 1 CS691 Summer 2009.
Overview of Digital Stenography
Pictures Worth More Than 1000 Words
Steganography Part 2 – Detection and Research. Introduction to Steganalysis What is steganalysis?  The art of detecting messages hidden by steganography.
Steganography Greg Mitchell COS413 Computer Forensics Professor Tony Gauvin.
Steganography Detection Brittnee Morgan December 22, 2004 HPR 108B.
Steganography Rayan Ghamri.
1. 2 Discussion Topic: Steganography By Chris Turla, Darien Hager, Jeremy Cheng, Pui Chee Chan INFO 498 – Information Security Autumn ’04.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #12 Computer Forensics Analysis/Validation and Recovering Graphic.
Security by obscurity. Greek “Concealed Writing” Steganography – the science of hiding a message so that only the recipient and sender are aware that.
Steganography Ryan Sacksteder. Overview What is Steganography? History Forms of Steganography Image Based Steganography Steganalysis Steganography’s Future.
STEGANOGRAPHY. C ONTENTS Defination Steganography History Steganalysis Steganography v/s Cryptography Steganography Under Various Media Steganographic.
Steganography Cyber Security Camp, July 22, 2015 Rodrigo Sardiñas Dr. David Umphress William Frazier.
Steganography detection Roland Cmorik, Martin Šumák.
Steganography Ben Lee III Long Truong ECE Spring 2002.
Steganography.
Steganography Steganography refers to any methodology used to hide a message (including text, sound, or picture) in a separate file. Most commonly text.
Watermarking University of Palestine Eng. Wisam Zaqoot May 2010.
Center for Information Security Technologies, Korea University Digital Image Steganalysis Kwang-Soo Lee.
S TEGANOGRAPHY The Art of Message Hiding. Cryptography: Securing Information in the Digital Age Part 1: Introduction to Steganography Part 2: Hands-on.
Introduction to Steganography & Steganalysis Laura Walters Department of Mathematics Iowa State University Ames, Iowa November 27,
Digital Steganography
University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot May 2011 May 2011 Steganalysis ITSS 4201 Internet Insurance and Information.
Steganography. Outline What is Steganography? History Steganography used nowadays? Terms Steganography methods Steganography Available Software Steganalysis.
December 4, 2007 Steganography By: Brittany Bugg and Makenzie Young.
Submitted By: Varun Singh Roll no.: MRT09UGBCS036.
Digital image processing is the use of computer algorithms to perform image processing on digital images which is a subfield of digital signal processing.
Steganography Kati Reiland CS 419 April 7, What is Steganography? Technically meaning “covered writing” Anything that hides information in another.
Steganography Ed Norris ECE /4/03. Introduction  Undetectable information hiding  Why undetectable?  The message and the communication itself.
STEGANOGRAPHY AND DIGITAL WATERMARKING KAKATIYA INSTITUTE OF TECHNOLOGY AND SCIENCES,WARANGAL.
Implementation of Least Significant Bit Image Steganography and its Steganalaysis By: Deniz Oran Fourth Quarter.
By, Harshada Mangesh Kshirsagar. TE Computer Bhatati Vidyapeeth’s College of Engg For Women,Pune-43.
Several Steganography Techniques 1. Write secret messages using invisible ink. 2.The hidden message in the body of delegates: also in ancient Greece.
Cryptographic Anonymity Project Alan Le
 Image based Steganography  Previous Work  Message Concealment Techniques  Using Punctuation Marks  Using modified Scytale Cipher  S-Tools Software.
Implementation of Least Significant Bit Image Steganography and its Steganalaysis By: Deniz Oran.
Lisa Fujii Cole, E. (2003). Hiding in Plain Sight: Steganography and the Art of Covert Communication. Indianapolis, Indiana: Wiley Publishing, Inc.
Implementation of Least Significant Bit Image Steganography and its Steganalaysis By: Deniz Oran Third Quarter.
Digital Steganography Jared Schmidt. In This Presentation… Digital Steganography Common Methods in Images Network Steganography Uses Steganalysis o Detecting.
FOOTPRINTING STEGANOGRAPHY.
By Colton Delman COSC 316. Greek roots –Steganos : covered –Graphie: writting Hidden communication The hiding of data, information, or messages in many.
A NEW AND SECURE INFORMATION HIDING SYSTEM USING CRYPT- STEGANOGRAPHY Anurag Kumar 424/IC/07.
STEGANOGRAPHY Sibaka Mahapatra Computer Science 3rd Year, Sec-E
Out of site… Out of Mind. By Fred A. DuBrock COSC-356 Steganography.
2 nd lecture.  Plaintext – ciphertext – encryption – decryption.  Cryptography – cryptanalysis – cryptanalyst – cryptology.  Authentication – Integrity.
Text File Hiding in Audio (WAV) File using Least Significant Bit Encoding Steganography A mini software project demonstration on By Satish Bhalshankar.
Digital Steganography
Introduction to Steganography
Steganography in WebP image using LSB embedding
Welcome
Digital Forensics 2 Lecture 2: Understanding steganography in graphic files Presented by : J.Silaa Lecture: FCI Based on Guide to Computer Forensics and.
Digital Forensics 2 (DFC721S)
Computers Talk Binary.
Steganography.
Steganography & Digital Watermarfking
Visit for more Learning Resources
Steganography with Digital Images
Khan, Mohammed Minhajuddin
Steganography ETPRO 2010.
Steganography Techniques and their use in Anonymity
UIT Unconference December 06, 2018 Ian Redzic
“Hiding in Plain Sight”
Information Hiding Techniques Using Magic Matrix
Image Based Steganography Using LSB Insertion Technique
STEGANOGRAPHY IN IMAGES
Presentation transcript:

MANAGEMENT OF STEGANOGRAPHY OLALEKAN A. ALABI COSC 454

Roadmap Brief overview of Steganography What is Steganography? Techniques of Steganography Steganography tools Short video of steganography Steganalysis Steganalysis tools Steganalyst and forms of attack Questions? References

Overview Steganography originated from the Greek words Stegnos meaning “Covered or Protected” The word graphein is used in Greeks meaning “write” The use of Steganography was first recorded around 440BC when Demaratus sent a warning message about a forthcoming attack to Greece Forms of steganography used back then: Tattooing information on their body Using invisible Ink Writing it directly on the wooden back of a wax tablet before applying beeswax surface

What is Steganography? Steganography is the science of hiding information within cover object It involves the alteration of bits in an image, sound document or even a text file The main purpose or goal of steganography is to hide the data from third party Simple steganography process: Cover_ medium + hidden_data + stego_key = stego_medium Cover_ medium => File to hide the hidden_data Stego_key => A form of encryption Stego_medium => The resultant file same as the Cover_medium In addition, the Cover_medium or Stego_medium are the audio files or image files

Techniques of Steganography Physical techniques Digital messages Digital text Social steganography Network steganography Printed steganography Using puzzles

Physical Techniques Invisible Ink Wax tablet Messenger’s body On envelopes Messages on paper written in secrets Ink Null ciphers (using the first letter of each words to form a hidden message in an otherwise innocuous text)

Digital Messages Concealing hidden messages in Images or sound files Tampered executable files, exploiting redundancy in the targeted instruction set Data within encrypted data or within random data Pictures embedded in video material Modifying the echo of a sound file Ignored sections of a file, such as after the logical end of the carrier file Steganography for audio signals

Steganography Tools Xiao steganography Hide secret files in BMP images or in WAV file with encryption support Open Stego Supports 203kb in size, password protected, it supports BMP, GIF, JPEG, JPG, PNG and WBMP. The output stego file can be save in PNG Camouflage Hide text file in JPEG, the resulting file can be called camouflaged and it behaves and looks like normal file Silent Eye Cross platform, hides sensitive messages behind image or audio file supports BMP, JPG, PNG, GIF, TIF and WAV

OpenPuff Supports up to 256 bytes of target data in one carrier BMP file. We also have: Steghide Our Secret Shusssh! Image Steganography SSuite Picsel Steganofile Clotho S-Tools

FxNhPHJsRY

Steganalysis Steganalysis is the study of detecting messages hidden using steganography The goal of steganalysis is to identify suspected packages, determine whether or not they have a payload encoded into them, and, if possible, recover that payload Various Detection Tools Guidance Software, Inc (Encase) ILook Investigator Comparing the MD5 hash values of two files with the program, md5sum.exe Stegdetect and Xsteg Stego Watch from WetStone Technologies Inc

Steganalyst and forms of attack A person skilled at finding messages hidden using steganography Attacks used by steganalyst: Stego-only attack: only the stego – object is available for analysis such as the stego- carrier and hidden information are available known cover attack: comparing original image with the stego-object and pattern differences are detected Known message attack: is the analysis of known patterns that correspond to hidden information, which may help against attacks in the future Chosen stego attack: the steganography tool and object are known Chosen message attack: goal is to determine corresponding patterns in the stego-object that may point to the use of specific stego tools or algorithms Known stego attack: stego tool is known and both the original and stego-object are available

Questions?

References information-computer-forensic-analysis FxNhPHJsRY